When this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.
etcd-client 0.12.4
This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.
etcd-client
(11 total, 4 outdated, 1 possibly insecure)
Crate | Required | Latest | Status |
---|---|---|---|
http | ^0.2.9 | 1.1.0 | out of date |
hyper | ^0.14.26 | 1.3.1 | out of date |
hyper-openssl | ^0.9 | 0.10.2 | out of date |
openssl ⚠️ | ^0.10 | 0.10.64 | maybe insecure |
prost | ^0.12.0 | 0.12.6 | up to date |
tokio | ^1.32.0 | 1.37.0 | up to date |
tokio-stream | ^0.1.14 | 0.1.15 | up to date |
tonic | ^0.10.0 | 0.11.0 | out of date |
tower | ^0.4.13 | 0.4.13 | up to date |
tower-service | ^0.3.2 | 0.3.2 | up to date |
visible | ^0.0.1 | 0.0.1 | up to date |
(1 total, all up-to-date)
Crate | Required | Latest | Status |
---|---|---|---|
tokio | ^1.32.0 | 1.37.0 | up to date |
openssl
: `openssl` `X509VerifyParamRef::set_host` buffer over-readWhen this function was passed an empty string, openssl
would attempt to call strlen
on it, reading arbitrary memory until it reached a NUL byte.